1. Lecture Notes in Computer Science;K.D. Akdemir,2011
2. Cardenas, A.A., Roosta, T., Sastry, S.: Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. Ad-Hoc Networks 7(8), 1434–1447 (2009)
3. National ICT Australia: Castalia,
http://castalia.npc.nicta.com.au/
4. Daidone, R., Dini, G., Tiloca, M.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wireless Networks (2013)
5. European Telecommunications Standard Institute: Telecommunications andf Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis, ETSI TS 102 165-1 V4.2.3 (2011-03) (2011)